<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Analysis Archives - Evina</title>
	<atom:link href="https://www.evina.com/category/analysis/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.evina.com/category/analysis/</link>
	<description>The most advanced cybersecurity for mobile payments and digital regulation</description>
	<lastBuildDate>Tue, 11 Jan 2022 10:49:10 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.evina.com/wp-content/uploads/2020/12/cropped-evina-ico-1-32x32.png</url>
	<title>Analysis Archives - Evina</title>
	<link>https://www.evina.com/category/analysis/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>A promising future for mobile money: Investment spike, separate entities, and confident regulators</title>
		<link>https://www.evina.com/a-promising-future-for-mobile-money-investment-spike-separate-entities-and-confident-regulators/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-promising-future-for-mobile-money-investment-spike-separate-entities-and-confident-regulators</link>
					<comments>https://www.evina.com/a-promising-future-for-mobile-money-investment-spike-separate-entities-and-confident-regulators/#respond</comments>
		
		<dc:creator><![CDATA[Evina]]></dc:creator>
		<pubDate>Tue, 11 Jan 2022 09:53:05 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Business growth]]></category>
		<guid isPermaLink="false">https://www.evina.com/?p=5352</guid>

					<description><![CDATA[<p>The year 2021 has clearly defined the direction mobile money will take, backed by heavy investments and great momentum of mobile phone usage. To support this growth, David Lotfi, CEO and founder of Evina, explains two opportunities all mobile operators must seize in 2022 to truly benefit from the mobile money explosion. </p>
<p>The post <a href="https://www.evina.com/a-promising-future-for-mobile-money-investment-spike-separate-entities-and-confident-regulators/">A promising future for mobile money: Investment spike, separate entities, and confident regulators</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>A pandemic and financial need that sculpted the future of mobile money&nbsp;</strong></p>



<p>During the now two-year pandemic, the digital world has seen a noticeable increase in online activity, more specifically mobile activity. The need to not rely on physical banks or handle physical money has fueled the surge in mobile money transactions. In fact, according to the <a href="https://www.gsma.com/mobilefordevelopment/wp-content/uploads/2021/03/GSMA_State-of-the-Industry-Report-on-Mobile-Money-2021_Full-report.pdf">GSMA</a>, 1.21 billion mobile money accounts were registered in 2020 marking a 12.7% growth, in 96 countries. The GSMA also states that the transaction values increasingly grew as well, with daily transactions exceeding $2 billion and transactions expected to surpass $3 billion per day by the end of 2022.&nbsp;&nbsp;</p>



<p>This year also marked a spike in investments in the digital payments space, starting with fintechs and mobile money services. As mobile phone users are expected to reach half of the African continent’s population by 2025 according to the GSMA, internet penetration increases, and overall greater adoption of digital financial services, investors are betting all on mobile financial services. Just last month, Airtel Africa’s mobile money service received a <a href="https://nairametrics.com/2021/12/16/chimera-investment-invests-50-million-in-airtel-africas-mobile-money-business/">$50 million investment</a> by Chimera investments, backed by a previous $25 million investment by Mastercard. Mobile money is a particularly versatile payment tool that is used for a variety of different purposes, particularly in countries in Sub-Saharan Africa and South Asia. Mobile money is used to receive a monthly salary, pay bills, lend money, and make purchases online or in physical stores.</p>



<p>The attention mobile money has received by investors foreshadows the tremendous potential of mobile money this year. Mobile operators looking to pave the smoothest way for this explosive growth must first address the organizational body of their mobile money services.&nbsp;</p>



<p><strong>More independent mobile money services entities for robust growth in 2022&nbsp;</strong></p>



<p>Regulators of mobile operators have a well-defined set of regulations they must follow that specifically pertain to the telecommunication services they offer. As we have seen, mobile operators have been developing their financial potential and deploying mobile money services that have gained paramount daily transaction value. In most cases, MNOs have to comply with both the telco regulations and stricter mobile money regulations. This is extremely costly and complicated for mobile operators who must enforce a myriad of regulations.&nbsp;</p>



<p>What we have seen in recent years, and what we will continue to see in 2022, is mobile operators creating a separate mobile money entity to be able to grow their business with greater ease and flexibility, following only specific mobile money regulations. Major mobile operators such as Orange and Airtel have initiated this organizational reconstruction, respectively with Orange Money and Airtel Money. Thanks to this set up mobile operators will be able to make their mobile money services a separate, independent company with the freedom to grow and become what it strives to be: a fintech.&nbsp;</p>



<p>Fintechs in Africa have raised nearly <a href="https://techcrunch.com/2022/01/04/fintechs-in-africa-continue-to-overshadow-all-other-startups-in-funding-gained/">$5 billion in 2021</a>, and as sole mobile money providers, the companies will attract even more investments. Investors will be lured by the youngness of the business, where there is sill be room to grow and to decide what direction the child company can take.&nbsp;</p>



<p>The freedom will also lie in the tools that mobile money providers can choose. The giant mobile operators already have dedicated tools and integrated processes for each specific activity, even when it comes to dealing with fraud. As a separate entity, the company can decide to choose the right anti-fraud tools, which are specific to a fintech company and the specific fraud-related challenges it faces. Mobile money can’t be treated like telecommunications, neither with the same regulations nor with the same anti-fraud solutions. Mobile money has its own specific needs, and with it, its own specific solutions. At Evina, we’ve developed a whole range of anti-fraud solutions that sustain mobile operators, to not only detect fraud but to do so while growing the business revenue. For mobile money, we have designed Mobile Money protect, a cutting-edge anti-fraud solution that tackles fraud attempts on mobile money services.&nbsp;</p>



<p>Along with the creation of the separate mobile money entity,&nbsp; there is a critical need to convince regulators to create enabling regulations for these entities to grow.&nbsp;</p>



<p><strong>Strengthened trust vis-à-vis the regulator and anti-fraud measures&nbsp;&nbsp;</strong></p>



<p>With the growing value of daily mobile money transactions, central banks and major regulators are seeking to regulate the large flow of money and protect the interests of all stakeholders. When fraud comes into play, regulators will automatically impose stricter rules that will limit the growth of mobile operators because they cannot be trusted to regulate themselves. It’s why it is in the interest of mobile operators to keep fraud at bay and have the right tools to manage these attacks. Major operators such as Airtel have already raised concerns regarding fraud on mobile money « What keeps me up at night frankly is the risks that are emerging through cyber [crime] » CEO of Airtel mobile commerce BV.</p>



<p>We have seen this phenomenon in plenty of markets: when responsible players implement Evina state-of-the-art anti-fraud solutions, entire markets have reaped the benefits, and payment methods such as direct carrier billing have been restored thanks to this renewed trust. Mobile Money Protect, Evina’s anti-fraud solution for mobile money payments, was designed to fend off fraud attacks on mobile money and help mobile operators reach new opportunities.&nbsp;</p>



<p>This new year will be vital for mobile operators to explore where fraud-free mobile money will take them, as independent entities and in an environment that fosters growth with empowering regulators.&nbsp;</p>



<p></p>



<p style="font-size:12px"><strong>Sources:</strong></p>



<ul class="wp-block-list" style="font-size:11px"><li><a href="https://techcrunch.com/2022/01/04/fintechs-in-africa-continue-to-overshadow-all-other-startups-in-funding-gained/">https://techcrunch.com/2022/01/04/fintechs-in-africa-continue-to-overshadow-all-other-startups-in-funding-gained/</a>&nbsp;</li><li><a href="https://www.gsma.com/mobilefordevelopment/wp-content/uploads/2021/03/GSMA_State-of-the-Industry-Report-on-Mobile-Money-2021_Full-report.pdf">https://www.gsma.com/mobilefordevelopment/wp-content/uploads/2021/03/GSMA_State-of-the-Industry-Report-on-Mobile-Money-2021_Full-report.pdf</a>&nbsp;</li><li><a href="https://www.idc.com/getdoc.jsp?containerId=META48126221">https://www.idc.com/getdoc.jsp?containerId=META48126221</a></li><li><a href="https://qz.com/africa/2109686/airtel-money-africa-ceo-vimal-kumar-explains-mobile-money-spin-off/">https://qz.com/africa/2109686/airtel-money-africa-ceo-vimal-kumar-explains-mobile-money-spin-off/</a></li></ul>
<p>The post <a href="https://www.evina.com/a-promising-future-for-mobile-money-investment-spike-separate-entities-and-confident-regulators/">A promising future for mobile money: Investment spike, separate entities, and confident regulators</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.evina.com/a-promising-future-for-mobile-money-investment-spike-separate-entities-and-confident-regulators/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to ensure the strongest DCB development in 2022 depending on the condition of your DCB market</title>
		<link>https://www.evina.com/how-to-ensure-the-strongest-dcb-development-in-2022-depending-on-the-health-of-your-dcb-market/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-ensure-the-strongest-dcb-development-in-2022-depending-on-the-health-of-your-dcb-market</link>
					<comments>https://www.evina.com/how-to-ensure-the-strongest-dcb-development-in-2022-depending-on-the-health-of-your-dcb-market/#respond</comments>
		
		<dc:creator><![CDATA[Evina]]></dc:creator>
		<pubDate>Tue, 11 Jan 2022 09:45:40 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Business growth]]></category>
		<guid isPermaLink="false">https://www.evina.com/?p=5347</guid>

					<description><![CDATA[<p>Direct carrier billing (DCB) is one of the mobile payments that shows the greatest potential. Worldwide, carrier billing will continue to grow and is expected to fulfill Juniper Research’s predictions of generating $66 billion annually by 2023, with a total growth of 172% from 2020 until 2025. </p>
<p>The post <a href="https://www.evina.com/how-to-ensure-the-strongest-dcb-development-in-2022-depending-on-the-health-of-your-dcb-market/">How to ensure the strongest DCB development in 2022 depending on the condition of your DCB market</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Yet, as we’ve explained in greater detail in the <a href="https://www.evina.com/resources/dcb-index-evina-telecoming/">DCB index</a> created in partnership with Telecoming, the state of DCB and its development aren’t homogeneous. For this reason, players can’t approach its growth in the same manner, and with the same anti-fraud solutions. Here is our advice to ensure the best DCB development in 2022.</p>



<p><strong>A DCB market facing “healthy issues”</strong></p>



<p>This type of market condition is the ideal situation. Here, fraud is no longer unmanageable because the mobile players in the ecosystem have found the right tools to keep fraud at bay. The trust between players is strong enough to continue to make payments through the carrier billing channel.&nbsp;&nbsp;</p>



<p>The most common challenge facing mobile operators and merchants is learning how to manage the strong growth of user purchases through&nbsp; DCB. Oftentimes, this surge in growth brings along an increase of issues related to user awareness regarding their purchases. Landing pages must follow a clear deontological chart to make the entire purchasing experience clear to the user, with no misleading buttons and information. User complaints are the most frequent issue encountered in healthy DCB markets.</p>



<p>To manage user complaints, Evina offers a simple brand safety solution to track flows of traffic and determine the level of compliance of ad placements. The solution makes it easy to identify content providers that generate fraudulent traffic, hence that are the source that generates user complaints. Evina Eyewitness is the other solution that is tailor-made for this situation, as the first solution in the world able to record data-enriched videos of what users actually see and do on the payment page. It saves time and money in complaints management and helps all players to maintain trustful and transparent relationships.&nbsp;</p>



<p><strong>Dormant DCB markets that are ready to reflourish in 2022</strong></p>



<p>When mobile players who offer DCB are not able to establish a solid level of trust among merchants, payment aggregators, mobile operators, and regulators, this payment method is quick to fail. The element of trust is disrupted by levels of unmanaged fraud, and unfortunately, it results in the suspension of direct carrier billing. We’ve seen this situation numerous times, <a href="https://www.evina.com/resources/case-study-proximus-x-evina/">here is the perfect example.</a></p>



<p>Sometimes, all it takes to reopen a DCB flow is partnering with one merchant that has proven to bring healthy traffic with low user complaint rates by working with the right anti-fraud partner. As the mobile operator realizes the potential of DCB payment flows, other partners will implement the anti-fraud solutions to protect and quickly install this quick and easy payment channel.&nbsp;</p>



<p>In this case, mobile operators can suggest merchants implement the core anti-fraud solution to detect and help block fraud attempts, Evina DCBprotect. DCBprotect is powered by cutting-edge technology that detects 99,94% of fraudulent transactions, with a&nbsp; 0,06% false-positive rate and &lt;100ms latency, assuring not only the best protection but also maximizing legitimate transactions and increasing DCB revenue.</p>



<p><strong>DCB markets in critical fraud situations</strong></p>



<p>Another situation we often see is markets where DCB is operational, yet heavily endangered by fraud attacks. Cybercriminals are hooked on these kinds of markets that haven’t adequately protected their mobile payment channels as they prey on the weakest links, with minimal to no anti-fraud protection.&nbsp;</p>



<p>High levels of fraud compromise the trust between mobile operators and merchants, and jeopardize the existence of DCB. In fact, we have dealt with situations where mobile operators have resorted to <a href="https://www.evina.com/resources/case-study-bouygues/">shutting down DCB altogether</a>, thinking there was no other way.&nbsp;&nbsp;</p>



<p>The solution here is to start protecting DCB as quickly as possible with the most effective anti-fraud solutions, starting with Evina DCBprotect. In addition to the core solution, players can implement the aforementioned solutions Evina Eyewitness and brand safety, to meet specific needs and reduce user complaints, after solving the heart of the problem.&nbsp;</p>
<p>The post <a href="https://www.evina.com/how-to-ensure-the-strongest-dcb-development-in-2022-depending-on-the-health-of-your-dcb-market/">How to ensure the strongest DCB development in 2022 depending on the condition of your DCB market</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.evina.com/how-to-ensure-the-strongest-dcb-development-in-2022-depending-on-the-health-of-your-dcb-market/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The return of the Facebook thieves</title>
		<link>https://www.evina.com/the-return-of-the-facebook-thieves/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-return-of-the-facebook-thieves</link>
					<comments>https://www.evina.com/the-return-of-the-facebook-thieves/#respond</comments>
		
		<dc:creator><![CDATA[Evina]]></dc:creator>
		<pubDate>Thu, 21 Oct 2021 08:18:32 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.evina.com/?p=4974</guid>

					<description><![CDATA[<p>About a year ago, our cybersecurity team's discovery of hidden in-app malware that was stealing Facebook credentials caught the attention of the press and the entire mobile ecosystem. This secret malware was stealing one of the most popular digital IDs of the decade, and it was going unnoticed.</p>
<p>The post <a href="https://www.evina.com/the-return-of-the-facebook-thieves/">The return of the Facebook thieves</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Today, Evina’s team of malware hunters have once again identified apps embedded with this kind of malware, which have persistently infected the most popular new free apps in the Play Store.&nbsp;</p>



<p>They work in exactly the same way. Their objective is to steal mobile users’ Facebook login credentials and data.</p>



<p>These apps require users to log in to their Facebook account to allow them to access the app&#8217;s content and, therefore, collect the credentials.</p>



<p>Below is one of the apps that featured malware, and was downloaded over +500K times.</p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:100%">
<figure class="wp-block-image size-large is-resized"><img fetchpriority="high" decoding="async" src="https://www.evina.com/wp-content/uploads/2021/10/Malware1-512x1024.jpeg" alt="" class="wp-image-4975" width="239" height="477" srcset="https://www.evina.com/wp-content/uploads/2021/10/Malware1-512x1024.jpeg 512w, https://www.evina.com/wp-content/uploads/2021/10/Malware1-150x300.jpeg 150w, https://www.evina.com/wp-content/uploads/2021/10/Malware1-768x1536.jpeg 768w, https://www.evina.com/wp-content/uploads/2021/10/Malware1-1024x2048.jpeg 1024w, https://www.evina.com/wp-content/uploads/2021/10/Malware1-116x232.jpeg 116w, https://www.evina.com/wp-content/uploads/2021/10/Malware1-232x464.jpeg 232w, https://www.evina.com/wp-content/uploads/2021/10/Malware1-203x405.jpeg 203w, https://www.evina.com/wp-content/uploads/2021/10/Malware1-405x810.jpeg 405w, https://www.evina.com/wp-content/uploads/2021/10/Malware1-1320x2640.jpeg 1320w, https://www.evina.com/wp-content/uploads/2021/10/Malware1-scaled.jpeg 1280w" sizes="(max-width: 239px) 100vw, 239px" /><figcaption>Photo Motion &#8211; one of the infected apps</figcaption></figure>



<p></p>



<p></p>
</div>
</div>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.evina.com/wp-content/uploads/2021/10/Malware2-512x1024.jpeg" alt="" class="wp-image-4976" width="248" height="496" srcset="https://www.evina.com/wp-content/uploads/2021/10/Malware2-512x1024.jpeg 512w, https://www.evina.com/wp-content/uploads/2021/10/Malware2-150x300.jpeg 150w, https://www.evina.com/wp-content/uploads/2021/10/Malware2-768x1536.jpeg 768w, https://www.evina.com/wp-content/uploads/2021/10/Malware2-1024x2048.jpeg 1024w, https://www.evina.com/wp-content/uploads/2021/10/Malware2-116x232.jpeg 116w, https://www.evina.com/wp-content/uploads/2021/10/Malware2-232x464.jpeg 232w, https://www.evina.com/wp-content/uploads/2021/10/Malware2-203x405.jpeg 203w, https://www.evina.com/wp-content/uploads/2021/10/Malware2-405x810.jpeg 405w, https://www.evina.com/wp-content/uploads/2021/10/Malware2-1320x2640.jpeg 1320w, https://www.evina.com/wp-content/uploads/2021/10/Malware2-scaled.jpeg 1280w" sizes="(max-width: 248px) 100vw, 248px" /><figcaption>The app requires the mobile user to log in to their Facebook account</figcaption></figure>



<p></p>



<p></p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" src="https://www.evina.com/wp-content/uploads/2021/10/Malware3.png" alt="" class="wp-image-4977" width="473" height="410" srcset="https://www.evina.com/wp-content/uploads/2021/10/Malware3.png 640w, https://www.evina.com/wp-content/uploads/2021/10/Malware3-300x260.png 300w, https://www.evina.com/wp-content/uploads/2021/10/Malware3-268x232.png 268w, https://www.evina.com/wp-content/uploads/2021/10/Malware3-535x464.png 535w, https://www.evina.com/wp-content/uploads/2021/10/Malware3-467x405.png 467w" sizes="(max-width: 473px) 100vw, 473px" /><figcaption>The app is ranked among the most popular free apps in many countries</figcaption></figure>



<p></p>



<p></p>



<p><strong>How it works</strong></p>



<p>To steal login credentials, the malware launches a webview and runs a javascript command to retrieve the values typed by the user.</p>



<p>The next step is to use the API graph to get the account information.</p>



<p></p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="287" src="https://www.evina.com/wp-content/uploads/2021/10/Malware4-1-1024x287.png" alt="" class="wp-image-4979" srcset="https://www.evina.com/wp-content/uploads/2021/10/Malware4-1-1024x287.png 1024w, https://www.evina.com/wp-content/uploads/2021/10/Malware4-1-300x84.png 300w, https://www.evina.com/wp-content/uploads/2021/10/Malware4-1-768x215.png 768w, https://www.evina.com/wp-content/uploads/2021/10/Malware4-1-827x232.png 827w, https://www.evina.com/wp-content/uploads/2021/10/Malware4-1-500x140.png 500w, https://www.evina.com/wp-content/uploads/2021/10/Malware4-1-1000x280.png 1000w, https://www.evina.com/wp-content/uploads/2021/10/Malware4-1.png 1077w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>Javascript commands to retrieve Facebook users&#8217; credentials</figcaption></figure>



<p></p>



<p></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="930" height="159" src="https://www.evina.com/wp-content/uploads/2021/10/Malware5.png" alt="" class="wp-image-4980" srcset="https://www.evina.com/wp-content/uploads/2021/10/Malware5.png 930w, https://www.evina.com/wp-content/uploads/2021/10/Malware5-300x51.png 300w, https://www.evina.com/wp-content/uploads/2021/10/Malware5-768x131.png 768w, https://www.evina.com/wp-content/uploads/2021/10/Malware5-500x85.png 500w" sizes="auto, (max-width: 930px) 100vw, 930px" /><figcaption>Request to the Facebook Graph API to obtain information about the Facebook profile</figcaption></figure>



<p></p>



<p></p>



<p><strong>The interesting malware feature</strong></p>



<p>The malware is interested in the advertising campaigns that mobile users might have launched, and it’s also interested in the credit card they have registered to do so.&nbsp;&nbsp;</p>



<p>This allows the malware to create its own advertising campaigns with the mobile user’s account, and thus their credit card.</p>



<p></p>



<p></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="856" height="245" src="https://www.evina.com/wp-content/uploads/2021/10/Malware6.png" alt="" class="wp-image-4981" srcset="https://www.evina.com/wp-content/uploads/2021/10/Malware6.png 856w, https://www.evina.com/wp-content/uploads/2021/10/Malware6-300x86.png 300w, https://www.evina.com/wp-content/uploads/2021/10/Malware6-768x220.png 768w, https://www.evina.com/wp-content/uploads/2021/10/Malware6-811x232.png 811w, https://www.evina.com/wp-content/uploads/2021/10/Malware6-500x143.png 500w" sizes="auto, (max-width: 856px) 100vw, 856px" /><figcaption>Obtains information on user ad campaigns</figcaption></figure>



<p></p>



<p></p>



<p>Here is a list of other identified malware-infected apps &#8211; in the top new apps of the Play Store:</p>



<p><a href="https://play.google.com/store/apps/details?id=com.cutestudio.neonphotoeffect&amp;gl=FR" target="_blank" rel="noreferrer noopener">https://play.google.com/store/apps/details?id=com.cutestudio.neonphotoeffect&amp;gl=FR</a></p>



<p><a href="https://t.co/nH6lgcGKBF?amp=1">https://play.google.com/store/apps/details?id=com.meicalhowell.motion.pixmotion…</a></p>



<p><a href="https://t.co/TCFOBfRo5e?amp=1">https://play.google.com/store/apps/details?id=com.Blodwen.Gower.photoeditlab…</a> </p>



<p>Note: At the moment, most of these apps have been deleted.</p>



<p></p>



<p><strong>Credits: Maxime Ingrao</strong></p>



<p><br>To never miss a cybersecurity update, <a href="https://www.evina.com/the-fraud-observer/">subscribe to our newsletter.</a></p>
<p>The post <a href="https://www.evina.com/the-return-of-the-facebook-thieves/">The return of the Facebook thieves</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.evina.com/the-return-of-the-facebook-thieves/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>They steal your Facebook</title>
		<link>https://www.evina.com/they-steal-your-facebook/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=they-steal-your-facebook</link>
					<comments>https://www.evina.com/they-steal-your-facebook/#respond</comments>
		
		<dc:creator><![CDATA[Vanessa Palladino]]></dc:creator>
		<pubDate>Tue, 09 Jun 2020 17:12:00 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.evina.com/?p=1656</guid>

					<description><![CDATA[<p>Evina blocks fraudulent traffic, but we don’t stop there.</p>
<p>The post <a href="https://www.evina.com/they-steal-your-facebook/">They steal your Facebook</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>New ways of perpetrating fraud are regularly brought to the attention of our cybersecurity experts and we recently discovered a new malware that steals Facebook logins. This malware could devastate your online and offline life by making off with the credentials of one of your most valued pieces of digital real estate. The malware was embedded in a large number of popular apps:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.55.53.png" alt="" class="wp-image-1662" width="398" height="156" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.55.53.png 940w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.55.53-300x118.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.55.53-768x303.png 768w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.55.53-588x232.png 588w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.55.53-500x197.png 500w" sizes="auto, (max-width: 398px) 100vw, 398px" /><figcaption>Example of infected apps</figcaption></figure>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="668" height="852" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.57.22.png" alt="" class="wp-image-1665" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.57.22.png 668w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.57.22-235x300.png 235w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.57.22-182x232.png 182w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.57.22-364x464.png 364w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.57.22-318x405.png 318w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.57.22-635x810.png 635w" sizes="auto, (max-width: 668px) 100vw, 668px" /><figcaption>And it is no surprise that there were numerous unfortunate victims.</figcaption></figure>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.58.36.png" alt="" class="wp-image-1667" width="280" height="143" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.58.36.png 773w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.58.36-300x154.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.58.36-768x394.png 768w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.58.36-452x232.png 452w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-18.58.36-500x257.png 500w" sizes="auto, (max-width: 280px) 100vw, 280px" /><figcaption>Comments on the infected applications</figcaption></figure>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<p>We had Google shut down those applications. Evina managed to successfully reverse-engineer the malware which enabled us to protect end users against it. This is critical for our customers:</p>



<h3 class="wp-block-heading">Brigitte De Ducla, Orange France</h3>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.02.16.png" alt="" class="wp-image-1669" width="105" height="105" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.02.16.png 372w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.02.16-300x300.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.02.16-150x150.png 150w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.02.16-232x232.png 232w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.02.16-80x80.png 80w" sizes="auto, (max-width: 105px) 100vw, 105px" /></figure>



<p>&#8220;We have successful results with Evina; in addition to providing us with premium protection on our carrier billing, they also help us create a safer customer journey, therefore preserving the global experience of our clients&#8221;.</p>



<p><strong>Here’s how they steal your Facebook</strong></p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.03.00.png" alt="" class="wp-image-1671" width="183" height="327" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.03.00.png 420w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.03.00-168x300.png 168w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.03.00-130x232.png 130w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.03.00-259x464.png 259w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.03.00-226x405.png 226w" sizes="auto, (max-width: 183px) 100vw, 183px" /><figcaption>In the foreground is the malware browser, in the background the real application</figcaption></figure>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<p>When an application is launched on your phone, the malware queries the application name. If it is a Facebook application, the malware will launch a browser that loads Facebook at the same time. The browser is displayed in the foreground which makes you think that the application launched it. When you enter your credentials into this browser, the malware executes java script to retrieve them. The malware then sends your account information to a server.</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.04.22.png" alt="" class="wp-image-1677" width="483" height="45" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.04.22.png 834w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.04.22-300x28.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.04.22-768x72.png 768w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.04.22-500x47.png 500w" sizes="auto, (max-width: 483px) 100vw, 483px" /><figcaption>Check if the Facebook app is running in the foreground</figcaption></figure>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.05.06.png" alt="" class="wp-image-1681" width="348" height="93" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.05.06.png 812w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.05.06-300x80.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.05.06-768x205.png 768w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.05.06-500x134.png 500w" sizes="auto, (max-width: 348px) 100vw, 348px" /><figcaption>Run the activity that contains the WebView</figcaption></figure>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.06.31-1024x242.png" alt="" class="wp-image-1685" width="305" height="72" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.06.31-1024x242.png 1024w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.06.31-300x71.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.06.31-768x182.png 768w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.06.31-980x232.png 980w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.06.31-500x118.png 500w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.06.31-1000x237.png 1000w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.06.31.png 1039w" sizes="auto, (max-width: 305px) 100vw, 305px" /><figcaption>The WebView loads the login page</figcaption></figure>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.07.32-1024x158.png" alt="" class="wp-image-1690" width="417" height="64" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.07.32-1024x158.png 1024w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.07.32-300x46.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.07.32-768x118.png 768w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.07.32-500x77.png 500w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.07.32-1000x154.png 1000w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.07.32.png 1053w" sizes="auto, (max-width: 417px) 100vw, 417px" /><figcaption>It executes javascript to get the credentials</figcaption></figure>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="243" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.08.27-1024x243.png" alt="" class="wp-image-1691" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.08.27-1024x243.png 1024w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.08.27-300x71.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.08.27-768x182.png 768w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.08.27-977x232.png 977w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.08.27-500x119.png 500w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.08.27-1000x237.png 1000w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.08.27.png 1188w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>And sends the data to airshop.pw<br></figcaption></figure>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Lionel Ferri, Evina CTO: “It’s a fraudulent technique that points out the danger and reflects how important it is to protect yourself. It cannot be identified by Facebook as the malware displays in front of the legit app when it is launched”.</p>



<p><strong>Why are you always targeted? Because everyone is targeted.</strong></p>



<p>Internet-based fraud has become so pervasive that sometimes it seems as if everyone you meet has, at some point or another, been a victim of digital fraud. Often when one is targeted by online fraudsters, the first reaction is ‘why me?’.</p>



<p>Rest assured that we are all in the same boat and while it is normal for the victim to think they have been specifically targeted, we are all targets. Furthermore, we must highlight that victims should never be blamed for the criminal actions of others.</p>



<p>Fraudsters are everywhere and they are not confined to the DCB sector. They lurk in every nook and cranny of the web and it is the job of experts like Evina to flush them out. Our clients are very helpful in this regard. They regularly provide us with valuable information that helps us lift the lid on what you could call the “digital fraud of the day”.</p>



<p>In conclusion, keep in mind once that the victims are not the culprits: the app developer, the app store and all other legitimate players involved are simply innocent victims of fraudsters and their malware. </p>
<p>The post <a href="https://www.evina.com/they-steal-your-facebook/">They steal your Facebook</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.evina.com/they-steal-your-facebook/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Evina protects end users from MobOk: an incessantly mutating malware family in Germany</title>
		<link>https://www.evina.com/evina-protects-end-users-from-mobok-an-incessantly-mutating-malware-family-in-germany/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=evina-protects-end-users-from-mobok-an-incessantly-mutating-malware-family-in-germany</link>
					<comments>https://www.evina.com/evina-protects-end-users-from-mobok-an-incessantly-mutating-malware-family-in-germany/#respond</comments>
		
		<dc:creator><![CDATA[Vanessa Palladino]]></dc:creator>
		<pubDate>Thu, 16 Apr 2020 09:51:00 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.evina.com/?p=2356</guid>

					<description><![CDATA[<p>Evina has detected the MobOk family of mobile malware in 49 Android applications.</p>
<p>The post <a href="https://www.evina.com/evina-protects-end-users-from-mobok-an-incessantly-mutating-malware-family-in-germany/">Evina protects end users from MobOk: an incessantly mutating malware family in Germany</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Several clues indicate a concentration of some of the malware in Germany. Even though it is unusual to see a whole family of malware victims in the same country, fraudsters always look for accessible targets and work on the weaknesses as long as it is lucrative. Germany is unfortunately not exempted. As typical for most malware, MobOk continues to evolve the way it hides its malicious code and fraud methods. In the world of mobile malware, this makes MobOk a particularly challenging opponent.</p>



<p><strong>All Evina customers: mobile operators, payment gateways and content editors are protected from MobOk and in doing so, so are all their customers.</strong></p>



<p>How does it work? MobOk collects information that is useful for its fraudulent activities such as the relevant operator details and mobile device screen size. It then launches an invisible browser that aims to subscribe the user to premium-rate mobile services using the applicable billing operator. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="380" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.42.35-1024x380.png" alt="" class="wp-image-2359" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.42.35-1024x380.png 1024w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.42.35-300x111.png 300w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.42.35-768x285.png 768w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.42.35-625x232.png 625w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.42.35-500x186.png 500w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.42.35-1000x371.png 1000w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.42.35.png 1078w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption><em>Some MobOk malware applications</em></figcaption></figure>



<p></p>



<p>MobOk will ask for permission to read notifications and this is how the malware is able to retrieve the content of SMS messages. Consumers have to accept permissions manually.</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.14.png" alt="" class="wp-image-2357" width="218" height="462" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.14.png 472w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.14-142x300.png 142w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.14-110x232.png 110w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.14-219x464.png 219w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.14-191x405.png 191w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.14-382x810.png 382w" sizes="auto, (max-width: 218px) 100vw, 218px" /></figure>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.47-486x1024.png" alt="" class="wp-image-2358" width="214" height="450" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.47-486x1024.png 486w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.47-142x300.png 142w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.47-110x232.png 110w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.47-220x464.png 220w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.47-192x405.png 192w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.47-384x810.png 384w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.41.47.png 580w" sizes="auto, (max-width: 214px) 100vw, 214px" /><figcaption><em>Phone Booster, a MobOk malware that looks very pro</em><br><br></figcaption></figure>



<p>There are several indications that this type of fraud initiated in Germany. First of all, the majority of negative comments are in German, furthermore the application communicates with the ium2.de domain and finally we have received attacks on German IPs. Other cases concern Asia, especially Thailand and Malaysia.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="645" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.43.34-1024x645.png" alt="" class="wp-image-2360" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.43.34-1024x645.png 1024w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.43.34-300x189.png 300w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.43.34-768x484.png 768w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.43.34-368x232.png 368w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.43.34-736x464.png 736w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.43.34-500x315.png 500w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.43.34-1000x630.png 1000w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.43.34.png 1082w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption><em>Google Play comments</em></figcaption></figure>



<div style="height:42px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>DETECTION</strong></p>



<p>Evina has created a honeypot that uses a network of 3G proxy SIM cards around the world to attract fraudulent activity. When we use SIMs in Germany, we have seen fraudulent subscriptions as a result of the MobOk application.</p>



<p><strong>MOBOK GENERATIONS</strong></p>



<p>The malware family has evolved a way to load its fraudulent code to avoid detection by the Play Store. </p>



<p><strong><em>First generation</em></strong></p>



<p>In the beginning, the malicious code was located directly in the application with only a simple obfuscation.</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.45.16.png" alt="" class="wp-image-2361" width="239" height="338" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.45.16.png 470w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.45.16-212x300.png 212w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.45.16-164x232.png 164w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.45.16-327x464.png 327w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.45.16-286x405.png 286w" sizes="auto, (max-width: 239px) 100vw, 239px" /><figcaption><em>NService class contains the service to read SMS in notifications</em></figcaption></figure>



<div style="height:42px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong><em>Second generation</em></strong></p>



<p>In the second generation of MobOk, the malware had an encrypted DEX file in the Assets folder that contained all the malicious code. The decrypted function was directly in the code.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.47.56.png" alt="" class="wp-image-2364" width="182" height="101"/><figcaption><em><em>Encrypted DEX file</em><br><br></em><br></figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.48.52.png" alt="" class="wp-image-2366" width="351" height="75" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.48.52.png 542w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.48.52-300x64.png 300w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.48.52-500x107.png 500w" sizes="auto, (max-width: 351px) 100vw, 351px" /><figcaption><em>The filename after decrypted is renamed a22777.dex</em><br><br></figcaption></figure></div>



<p><strong><em>Third generation</em></strong></p>



<p>Finally, MobOk uses the Bangcle packer, to hide all the files from the library and also has significant anti-reverse engineering protection.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.50.07.png" alt="" class="wp-image-2368" width="182" height="164" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.50.07.png 398w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.50.07-300x270.png 300w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.50.07-258x232.png 258w" sizes="auto, (max-width: 182px) 100vw, 182px" /><figcaption><em>Phone Booster source is packed by Bangcle</em></figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.51.24.png" alt="" class="wp-image-2370" width="149" height="331" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.51.24.png 320w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.51.24-135x300.png 135w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.51.24-105x232.png 105w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.51.24-209x464.png 209w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.51.24-183x405.png 183w" sizes="auto, (max-width: 149px) 100vw, 149px" /><figcaption><em>.. And then after we unpacked it</em><br><br></figcaption></figure></div>



<p><strong>FRAUD SCENARIO</strong></p>



<p>During the attack, MobOk sends information from the affected phone to a C&amp;C (Command and Control) server whose domain is: <strong>ium2.de</strong>. The send request is encrypted by the application.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.52.21-1024x241.png" alt="" class="wp-image-2371" width="682" height="160" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.52.21-1024x241.png 1024w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.52.21-300x70.png 300w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.52.21-768x180.png 768w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.52.21-988x232.png 988w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.52.21-500x117.png 500w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.52.21-1000x235.png 1000w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.52.21.png 1124w" sizes="auto, (max-width: 682px) 100vw, 682px" /><figcaption><em>Request to the command and control server ium2.de</em><br><br></figcaption></figure></div>



<p>The server in response provides MobOk with the URLs and Javascript to execute in order to achieve this fraud. The response is also encrypted.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="916" height="788" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.53.07.png" alt="" class="wp-image-2372" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.53.07.png 916w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.53.07-300x258.png 300w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.53.07-768x661.png 768w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.53.07-270x232.png 270w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.53.07-539x464.png 539w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.53.07-471x405.png 471w" sizes="auto, (max-width: 916px) 100vw, 916px" /><figcaption><em>Server response decrypted</em></figcaption></figure>



<div style="height:42px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Then, MobOk turns off the WiFi to connect to the mobile network where it will be able to charge for the premium service.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="204" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.04-1024x204.png" alt="" class="wp-image-2373" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.04-1024x204.png 1024w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.04-300x60.png 300w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.04-768x153.png 768w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.04-500x99.png 500w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.04-1000x199.png 1000w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.04.png 1096w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption><em>Disable wifi network</em></figcaption></figure>



<div style="height:42px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Finally, the malware launches an invisible browser where it browses the URLs it has received and executes Javascript commands.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="511" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.41-1024x511.png" alt="" class="wp-image-2374" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.41-1024x511.png 1024w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.41-300x150.png 300w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.41-768x383.png 768w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.41-465x232.png 465w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.41-930x464.png 930w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.41-500x250.png 500w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.41-1000x499.png 1000w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.54.41.png 1110w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption><em>Load url and javascript in invisible webview</em></figcaption></figure>



<div style="height:42px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>SUMMARY</strong></p>



<p>MobOk is a family of malware that is constantly evolving to remain undetected by the Google Play Store. In its latest generation, and according to our sources, none of the malware in the family has been detected. It is quite likely that MobOk will spread to many other countries and, given the code, that it will extend its fraudulent activities.</p>



<p><strong>HOW TO PROTECT YOURSELF?</strong></p>



<p>If you are an end-user, it is necessary to be careful with the applications you download. To limit the risk, we advise you:</p>



<ul class="wp-block-list"><li>To check the comments on the application page</li><li>To check the permissions (a wallpaper app does not need to have any specific phone permissions)</li><li>Avoid flashlight, scanner, wallpaper, SMS applications</li></ul>



<p>If you are a service provider, such as a mobile carrier, payment gateway or content editor, you must use an independent anti-fraud solution expert in payment and mobile cybersecurity.&nbsp;</p>



<p>Evina guarantees end-users safety and ensures a sustainable growth of the German mobile payment market, collaborating with local carriers such as Mobilcom-Debitel and T-Mobile.</p>



<p><strong>APPS</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="893" height="1024" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.28-893x1024.png" alt="" class="wp-image-2375" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.28-893x1024.png 893w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.28-262x300.png 262w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.28-768x881.png 768w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.28-202x232.png 202w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.28-405x464.png 405w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.28-353x405.png 353w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.28-706x810.png 706w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.28.png 1062w" sizes="auto, (max-width: 893px) 100vw, 893px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="83" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.50-1024x83.png" alt="" class="wp-image-2376" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.50-1024x83.png 1024w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.50-300x24.png 300w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.50-768x62.png 768w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.50-500x40.png 500w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.50-1000x81.png 1000w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.56.50.png 1062w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="704" height="930" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.57.16.png" alt="" class="wp-image-2377" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.57.16.png 704w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.57.16-227x300.png 227w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.57.16-176x232.png 176w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.57.16-351x464.png 351w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.57.16-307x405.png 307w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.57.16-613x810.png 613w" sizes="auto, (max-width: 704px) 100vw, 704px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="708" height="970" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.58.51.png" alt="" class="wp-image-2380" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.58.51.png 708w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.58.51-219x300.png 219w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.58.51-169x232.png 169w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.58.51-339x464.png 339w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.58.51-296x405.png 296w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.58.51-591x810.png 591w" sizes="auto, (max-width: 708px) 100vw, 708px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="79" src="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.59.19-1024x79.png" alt="" class="wp-image-2381" srcset="https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.59.19-1024x79.png 1024w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.59.19-300x23.png 300w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.59.19-768x59.png 768w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.59.19-500x39.png 500w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.59.19-1000x77.png 1000w, https://www.evina.com/wp-content/uploads/2021/01/Screenshot-2021-01-06-at-11.59.19.png 1062w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
<p>The post <a href="https://www.evina.com/evina-protects-end-users-from-mobok-an-incessantly-mutating-malware-family-in-germany/">Evina protects end users from MobOk: an incessantly mutating malware family in Germany</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.evina.com/evina-protects-end-users-from-mobok-an-incessantly-mutating-malware-family-in-germany/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google Recaptcha is not an anti-fraud solution.</title>
		<link>https://www.evina.com/google-recaptcha-is-not-an-anti-fraud-solution/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=google-recaptcha-is-not-an-anti-fraud-solution</link>
					<comments>https://www.evina.com/google-recaptcha-is-not-an-anti-fraud-solution/#respond</comments>
		
		<dc:creator><![CDATA[Vanessa Palladino]]></dc:creator>
		<pubDate>Tue, 10 Mar 2020 18:40:00 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.evina.com/?p=1715</guid>

					<description><![CDATA[<p>Google reCAPTCHA puts end users in double jeopardy: </p>
<p>The post <a href="https://www.evina.com/google-recaptcha-is-not-an-anti-fraud-solution/">Google Recaptcha is not an anti-fraud solution.</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<ol class="wp-block-list"><li>It exposes users to fraud</li><li>It prevents them from purchasing what they want</li></ol>



<p>Google reCaptcha is the CAPTCHA solution offered by Google, which we have all already seen before:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.38.11.png" alt="" class="wp-image-1718" width="160" height="233" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.38.11.png 399w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.38.11-206x300.png 206w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.38.11-159x232.png 159w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.38.11-319x464.png 319w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.38.11-278x405.png 278w" sizes="auto, (max-width: 160px) 100vw, 160px" /></figure>



<p></p>



<p>Google recently created a third version, and it doesn’t work better.&nbsp;<br></p>



<p>1- Google reCAPTCHA exposes end users to fraud</p>



<p>Since 2012, hacking Google reCAPTCHA has become a national sport:&nbsp;</p>



<ul class="wp-block-list"><li><a href="https://arstechnica.com/information-technology/2012/05/google-recaptcha-brought-to-its-knees/" target="_blank" rel="noreferrer noopener">https://arstechnica.com/information-technology/2012/05/google-recaptcha-brought-to-its-knees/</a></li><li><a href="https://threatpost.com/google-recaptcha-bypass-technique-uses-googles-own-tools/124006/" target="_blank" rel="noreferrer noopener">https://threatpost.com/google-recaptcha-bypass-technique-uses-googles-own-tools/124006/</a></li><li><a href="https://www.wired.co.uk/article/google-captcha-recaptcha" target="_blank" rel="noreferrer noopener">https://www.wired.co.uk/article/google-captcha-recaptcha&nbsp;</a></li></ul>



<p>On the dark web, fraudsters resell kits to bypass Google reCAPTCHA industrially. On the web, it costs 1,5$ per 1000 Google reCAPTCHA hacked: <a href="https://anti-captcha.com/mainpage" target="_blank" rel="noreferrer noopener">https://anti-captcha.com/mainpage</a></p>



<p>Abdelaziz Khaled, Cyber Security Analyst at EVINA: “These tools are easy to download and set up. We find them everywhere. When we reverse-engineer a malware, as we did with <a href="https://www.evina.com/evina-protects-end-users-mobok-a-malware-family-in-constant-evolution-that-perpetrates-mobile-fraud-in-germany/" target="_blank" rel="noreferrer noopener">MOBOK Malware,</a> it involves a part of coding dedicated to bypassing Google reCAPTCHA” (picture below).</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.39.16.png" alt="" class="wp-image-1719" width="400" height="111" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.39.16.png 913w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.39.16-300x83.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.39.16-768x214.png 768w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.39.16-834x232.png 834w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-19.39.16-500x139.png 500w" sizes="auto, (max-width: 400px) 100vw, 400px" /></figure>



<p>2- It prevents customers from purchasing what they want</p>



<p>Indeed, Google reCAPTCHA v3 generates false positives.</p>



<p>Wesley Hendriks, Head of Data Team at Sam Media: “We have tested Google reCAPTCHA v3 and compared the results with other anti-fraud solutions.&nbsp; We noticed that around 50% of legitimate traffic, according to other anti-fraud solutions, received the lowest scores &#8211; ’10’ or ‘30’-&nbsp; from Google reCAPTCHA V3.”</p>



<p>Since the product is free, Google offers very little support and understanding of the data collected. Google provides clients with a score between 0.0 and 1.0 for them to determine which transaction to block. Yet support and thorough analysis are key to fight fraud the right way.</p>



<p>Fabienne Huygens, Product Owner at CM.com: “When it comes to an anti-fraud solution, support is essential. The team at Evina is proactive and supports our teams on a daily basis to fight against fraud.”</p>



<p>Franck Semanne, Head of Carrier Billing at Bouygues Telecom: “In terms of anti-fraud solutions, we can’t rely on an average score to let us decide what we consider as a fraud. An anti-fraud solution must detect and precisely define a fraudulent attempt, and this is what we appreciate with Evina.”</p>



<p>Our team is at your disposal to provide you with effective tools to combat fraud, and to help your partners understand that Google reCAPTCHA is not an optimal anti-fraud solution.</p>
<p>The post <a href="https://www.evina.com/google-recaptcha-is-not-an-anti-fraud-solution/">Google Recaptcha is not an anti-fraud solution.</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.evina.com/google-recaptcha-is-not-an-anti-fraud-solution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ad fraud: a troll lives in a one million install game</title>
		<link>https://www.evina.com/ad-fraud-a-troll-lives-in-a-one-million-install-game-eng/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ad-fraud-a-troll-lives-in-a-one-million-install-game-eng</link>
					<comments>https://www.evina.com/ad-fraud-a-troll-lives-in-a-one-million-install-game-eng/#respond</comments>
		
		<dc:creator><![CDATA[Vanessa Palladino]]></dc:creator>
		<pubDate>Tue, 10 Mar 2020 15:54:00 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.evina.com/?p=4618</guid>

					<description><![CDATA[<p>Evina has been observing a new malicious SDK on Google Play Store. So far, we have detected it in 3 applications, displayed since December 2019,  including a game that has been installed more than a million times: Parkour Roller.</p>
<p>The post <a href="https://www.evina.com/ad-fraud-a-troll-lives-in-a-one-million-install-game-eng/">Ad fraud: a troll lives in a one million install game</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The malicious SDK — going by the name Troll (the class name which execute the fraud) —&nbsp; simulates the interaction with advertisements, collects information and subscribes to premium services without the user noticing: the browser is invisible during the fraud.</p>



<p>Our customers are safe from this malware thanks to Evina’s protection.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="220" height="445" src="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll1.png" alt="" class="wp-image-4619" srcset="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll1.png 220w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll1-148x300.png 148w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll1-115x232.png 115w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll1-200x405.png 200w" sizes="auto, (max-width: 220px) 100vw, 220px" /><figcaption>Parkour Roller Screenshots</figcaption></figure>



<p>In order to charge for services the Troll SDK disables the WIFI, which draw user’s attention and bring them to give a bad rate on Google Play Store. To get around the problem, bots located in Thailand raise the average rating posting numerous 5-stars comments.</p>



<p>It seems the fraud is global with comments in Asia (Indian and Thai). Regarding Europe, the app is well-ranked in Austria, Italy and Spain.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="491" height="256" src="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll2.png" alt="" class="wp-image-4620" srcset="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll2.png 491w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll2-300x156.png 300w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll2-445x232.png 445w" sizes="auto, (max-width: 491px) 100vw, 491px" /><figcaption>Google Play global rating history of the app</figcaption></figure>



<p>FUNCTIONALITY</p>



<p>After installation, the Troll SDK waits several launches of the app before being executed and sending information to register to the Command &amp; Control server hihotdog.com.</p>



<p>In return, the server responds with parameters including the phone_id which is used to query the server that will retrieve fraudulent offers. We also find information to execute the frauds like the time interval between each fraud.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="339" height="341" src="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll3.png" alt="" class="wp-image-4621" srcset="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll3.png 339w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll3-298x300.png 298w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll3-150x150.png 150w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll3-231x232.png 231w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll3-80x80.png 80w" sizes="auto, (max-width: 339px) 100vw, 339px" /><figcaption>Server response</figcaption></figure>



<p>Then, the Troll SDK executes the function doBiz, and next it queries the server to retrieve the fraudulent offers and disables the WIFI to go to the operator’s network.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="906" height="439" src="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll4.png" alt="" class="wp-image-4622" srcset="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll4.png 906w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll4-300x145.png 300w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll4-768x372.png 768w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll4-479x232.png 479w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll4-500x242.png 500w" sizes="auto, (max-width: 906px) 100vw, 906px" /><figcaption>Troll SDK gets fraudulent jobs</figcaption></figure>



<p>Finally, the Troll SDK executes the urls and javascript contained in the server response.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="847" height="535" src="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll5.png" alt="" class="wp-image-4624" srcset="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll5.png 847w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll5-300x189.png 300w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll5-768x485.png 768w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll5-367x232.png 367w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll5-735x464.png 735w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll5-500x316.png 500w" sizes="auto, (max-width: 847px) 100vw, 847px" /><figcaption>Troll SDK executes javascript</figcaption></figure>



<p>It is common to find offended code or fraudulent files that are downloaded after installation in frauds to fool users. But this new fraudulent SDK does not hide, it uses a rather explicit name “Troll” and method names like “doBiz” …</p>



<p>It is surprising to see that the application has not been removed yet while there is no will to hide the fraud, especially since it has been installed a million times.</p>



<p>It is therefore necessary to be careful with the applications you download, to limit the risk we advise you:</p>



<p>To check the comments on the application page</p>



<p>To check the permissions (a wallpaper app don’t need to have phone permissions)</p>



<p>Avoid flashlight, scanner, wallpaper applications</p>



<p>We have reported the concerned apps to Google.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="737" height="160" src="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll6.png" alt="" class="wp-image-4623" srcset="https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll6.png 737w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll6-300x65.png 300w, https://www.evina.com/wp-content/uploads/2021/07/AdFraudTroll6-500x109.png 500w" sizes="auto, (max-width: 737px) 100vw, 737px" /><figcaption>Applications</figcaption></figure>
<p>The post <a href="https://www.evina.com/ad-fraud-a-troll-lives-in-a-one-million-install-game-eng/">Ad fraud: a troll lives in a one million install game</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.evina.com/ad-fraud-a-troll-lives-in-a-one-million-install-game-eng/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malware rises to the top applications in the Google Play store</title>
		<link>https://www.evina.com/malware-rises-to-the-top-applications-in-the-google-play-store/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=malware-rises-to-the-top-applications-in-the-google-play-store</link>
					<comments>https://www.evina.com/malware-rises-to-the-top-applications-in-the-google-play-store/#respond</comments>
		
		<dc:creator><![CDATA[Vanessa Palladino]]></dc:creator>
		<pubDate>Thu, 09 Jan 2020 17:09:00 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.evina.com/?p=4629</guid>

					<description><![CDATA[<p>Evina found malware in the Google Play Store’s top application rankings called “Stars Wallpapers.”</p>
<p>The post <a href="https://www.evina.com/malware-rises-to-the-top-applications-in-the-google-play-store/">Malware rises to the top applications in the Google Play store</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>This malware is able to simulate real human behavior and take several actions like clicking on ad banners or subscribing to paying services. It is also able to activate/deactivate wifi and send/read SMS on the device.</p>



<p>Users complaint on the app Play Store page: content was disappointing, and some users have been subscribed to paid services without their consent. We also were able to confirm that EVINA DCBprotect blocked this malware since its very beginning. Companies protected by our solution have not been impacted by this fraud.</p>



<p>Since last weekend the application is ranked in the top free applications in France, Germany, Italy, Spain and in the Netherlands.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="322" height="540" src="https://www.evina.com/wp-content/uploads/2021/07/TopMalware1.png" alt="" class="wp-image-4630" srcset="https://www.evina.com/wp-content/uploads/2021/07/TopMalware1.png 322w, https://www.evina.com/wp-content/uploads/2021/07/TopMalware1-179x300.png 179w, https://www.evina.com/wp-content/uploads/2021/07/TopMalware1-138x232.png 138w, https://www.evina.com/wp-content/uploads/2021/07/TopMalware1-277x464.png 277w, https://www.evina.com/wp-content/uploads/2021/07/TopMalware1-242x405.png 242w" sizes="auto, (max-width: 322px) 100vw, 322px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="768" height="678" src="https://www.evina.com/wp-content/uploads/2021/07/TopMalware2-Google-Play-Store-Ranking-Source-AppBrain.png" alt="" class="wp-image-4631" srcset="https://www.evina.com/wp-content/uploads/2021/07/TopMalware2-Google-Play-Store-Ranking-Source-AppBrain.png 768w, https://www.evina.com/wp-content/uploads/2021/07/TopMalware2-Google-Play-Store-Ranking-Source-AppBrain-300x265.png 300w, https://www.evina.com/wp-content/uploads/2021/07/TopMalware2-Google-Play-Store-Ranking-Source-AppBrain-263x232.png 263w, https://www.evina.com/wp-content/uploads/2021/07/TopMalware2-Google-Play-Store-Ranking-Source-AppBrain-526x464.png 526w, https://www.evina.com/wp-content/uploads/2021/07/TopMalware2-Google-Play-Store-Ranking-Source-AppBrain-459x405.png 459w" sizes="auto, (max-width: 768px) 100vw, 768px" /><figcaption>Google Play Store Ranking (Source AppBrain)</figcaption></figure>



<p></p>



<p>“Stars Wallpapers” has been downloaded more than 100,000 times in three days between January 2nd and January 5th.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="647" height="281" src="https://www.evina.com/wp-content/uploads/2021/07/Topmalware3.png" alt="" class="wp-image-4632" srcset="https://www.evina.com/wp-content/uploads/2021/07/Topmalware3.png 647w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware3-300x130.png 300w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware3-534x232.png 534w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware3-500x217.png 500w" sizes="auto, (max-width: 647px) 100vw, 647px" /><figcaption>Number of installations (Source AppBrain)</figcaption></figure>



<p>How did we find it?</p>



<p>Evina uses its own global proxies network to catch frauds. We noticed an unusual behavior of few of them (data consumption higher than expected, bill invoiced for premium service). When noticing this kind of behavior, we dug on history and found where it came from: an application called “Stars Wallpapers.”</p>



<p>During the application’s analysis, we spotted that a piece of code of the application was missing even though it was declared.</p>



<p>We quickly realized that a library inside the application loads the fraudulent code. It creates two encrypted Dex files and deletes one of them as soon as it has been created and then loads it into the memory.</p>



<p>This method prevents detection by Google Play Store because the malicious code is not directly in the application.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="487" height="150" src="https://www.evina.com/wp-content/uploads/2021/07/Topmalware4.png" alt="" class="wp-image-4633" srcset="https://www.evina.com/wp-content/uploads/2021/07/Topmalware4.png 487w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware4-300x92.png 300w" sizes="auto, (max-width: 487px) 100vw, 487px" /><figcaption>The application loads the library at start</figcaption></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="939" height="264" src="https://www.evina.com/wp-content/uploads/2021/07/Topmalware5.png" alt="" class="wp-image-4634" srcset="https://www.evina.com/wp-content/uploads/2021/07/Topmalware5.png 939w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware5-300x84.png 300w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware5-768x216.png 768w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware5-825x232.png 825w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware5-500x141.png 500w" sizes="auto, (max-width: 939px) 100vw, 939px" /><figcaption>Stack view of libkf.so library</figcaption></figure>



<p>First of all, the malware creates an invisible window to track the user’s behavior and trigger the fraud at the right time.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="939" height="420" src="https://www.evina.com/wp-content/uploads/2021/07/Topmalware6.png" alt="" class="wp-image-4635" srcset="https://www.evina.com/wp-content/uploads/2021/07/Topmalware6.png 939w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware6-300x134.png 300w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware6-768x344.png 768w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware6-519x232.png 519w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware6-500x224.png 500w" sizes="auto, (max-width: 939px) 100vw, 939px" /><figcaption>Sample code of Stars Wallpapers malware</figcaption></figure>



<p>During this time, the application receives and writes instructions in streaming with a server on the faymobi.com domain on port 9091 (which helps to hide these exchanges).</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="939" height="91" src="https://www.evina.com/wp-content/uploads/2021/07/Topmalware7.png" alt="" class="wp-image-4636" srcset="https://www.evina.com/wp-content/uploads/2021/07/Topmalware7.png 939w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware7-300x29.png 300w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware7-768x74.png 768w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware7-500x48.png 500w" sizes="auto, (max-width: 939px) 100vw, 939px" /></figure>



<p>Fraud instructions are stored in the application’s shared preferences. It contains encrypted information about the javascript actions to execute but also the information whether you have to send a sms or if you have to pass a captcha during the journey.</p>



<p>It also includes the time interval between each attack and the maximum number of attacks per day.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="831" height="245" src="https://www.evina.com/wp-content/uploads/2021/07/Topmalware8.png" alt="" class="wp-image-4637" srcset="https://www.evina.com/wp-content/uploads/2021/07/Topmalware8.png 831w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware8-300x88.png 300w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware8-768x226.png 768w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware8-787x232.png 787w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware8-500x147.png 500w" sizes="auto, (max-width: 831px) 100vw, 831px" /><figcaption>Encrypted fraud instructions in shared_prefs folder</figcaption></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="666" height="437" src="https://www.evina.com/wp-content/uploads/2021/07/Topmalware9.png" alt="" class="wp-image-4638" srcset="https://www.evina.com/wp-content/uploads/2021/07/Topmalware9.png 666w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware9-300x197.png 300w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware9-354x232.png 354w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware9-500x328.png 500w" sizes="auto, (max-width: 666px) 100vw, 666px" /><figcaption>Scan the captcha and send to an API to get the result</figcaption></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="989" height="414" src="https://www.evina.com/wp-content/uploads/2021/07/Topmalware10.png" alt="" class="wp-image-4639" srcset="https://www.evina.com/wp-content/uploads/2021/07/Topmalware10.png 989w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware10-300x126.png 300w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware10-768x321.png 768w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware10-554x232.png 554w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware10-500x209.png 500w" sizes="auto, (max-width: 989px) 100vw, 989px" /><figcaption>Check to see if a new SMS is received</figcaption></figure>



<p>At the right time, the malware disables the wifi to be on the mobile network and launches an invisible browser, it executes all the actions of the file in the shared_prefs which thus subscribes to a premium service.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="939" height="281" src="https://www.evina.com/wp-content/uploads/2021/07/Topmalware11.png" alt="" class="wp-image-4640" srcset="https://www.evina.com/wp-content/uploads/2021/07/Topmalware11.png 939w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware11-300x90.png 300w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware11-768x230.png 768w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware11-775x232.png 775w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware11-500x150.png 500w" sizes="auto, (max-width: 939px) 100vw, 939px" /><figcaption>Disable wifi</figcaption></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="924" height="662" src="https://www.evina.com/wp-content/uploads/2021/07/Topmalware12.png" alt="" class="wp-image-4641" srcset="https://www.evina.com/wp-content/uploads/2021/07/Topmalware12.png 924w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware12-300x215.png 300w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware12-768x550.png 768w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware12-324x232.png 324w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware12-648x464.png 648w, https://www.evina.com/wp-content/uploads/2021/07/Topmalware12-500x358.png 500w" sizes="auto, (max-width: 924px) 100vw, 924px" /><figcaption>Launch Webview</figcaption></figure>



<p>It is common to say that malware hides in unofficial store or is not very visible and contains suspicious permissions.</p>



<p>That’s why Stars Wallpapers is dangerous because it doesn’t ask for any suspicious permissions, the content of the application looks professional and above all it is very well-ranked on Google Play Store.</p>



<p>Fortunately, victims of this malware were able to comment or rate this application to warn of its dangerousness, which stopped its number of installations but not its ranking.</p>



<p>It is therefore necessary to be careful with the applications you download, to limit the risk we advise you:</p>



<p>To check the comments on the application page</p>



<p>To check the permissions (a wallpaper app don’t need to have phone permissions)</p>
<p>The post <a href="https://www.evina.com/malware-rises-to-the-top-applications-in-the-google-play-store/">Malware rises to the top applications in the Google Play store</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.evina.com/malware-rises-to-the-top-applications-in-the-google-play-store/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Evina’s cybersecurity analysts found a new trojan family on Google play store.</title>
		<link>https://www.evina.com/evinas-cybersecurity-analysts-found-a-new-trojan-family-on-google-play-store/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=evinas-cybersecurity-analysts-found-a-new-trojan-family-on-google-play-store</link>
					<comments>https://www.evina.com/evinas-cybersecurity-analysts-found-a-new-trojan-family-on-google-play-store/#respond</comments>
		
		<dc:creator><![CDATA[Vanessa Palladino]]></dc:creator>
		<pubDate>Tue, 10 Dec 2019 19:14:00 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.evina.com/?p=1750</guid>

					<description><![CDATA[<p>A new Trojan family is targeting carrier billing and advertising. </p>
<p>The post <a href="https://www.evina.com/evinas-cybersecurity-analysts-found-a-new-trojan-family-on-google-play-store/">Evina’s cybersecurity analysts found a new trojan family on Google play store.</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>After Joker, the Venus malware is spreading fast: since October 2020, 8 infected apps have already been discovered with over 285,000 installs in total and only one has been removed from the Google Play Store.</p>



<p>Evina has been tracking a new ad and subscription bot family on Google Play. It is a new malware family that targets carrier billing and advertising. This type of fraud is becoming more and more widespread and is now able to bypass Google’s detection system.</p>



<p>The malware — going by the name Venus (the class name which executes the fraud) — simulates the interaction with ads and subscribes the user to premium services without him being aware. The browser is fully invisible during the on-going fraud.</p>



<p>The Venus malware has been attacking since late October and has reached the following countries: Belgium, France, Germany, Guinea, Morocco, Netherlands, Poland, Portugal, Senegal, Spain, and Tunisia.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="936" height="345" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.01.58.png" alt="" class="wp-image-1751" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.01.58.png 936w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.01.58-300x111.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.01.58-768x283.png 768w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.01.58-629x232.png 629w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.01.58-500x184.png 500w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure></div>



<p></p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.02.16.png" alt="" class="wp-image-1752" width="103" height="208" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.02.16.png 155w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.02.16-149x300.png 149w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.02.16-115x232.png 115w" sizes="auto, (max-width: 103px) 100vw, 103px" /><figcaption>APK content of Venus malware<br><br></figcaption></figure></div>



<p>The application uses the libjiagu library created by the Chinese company Qihoo. The library protects the application’s content and runs protections against reverse engineering. Unfortunately, fraudsters take advantage of the library and use it for mischevious purposes.</p>



<p>Yet, we were able to recover the DEX file (compiled Android file) containing the fraudulent code. The file was imported and decrypted in memory, after the anti-reverse check, in order to bypass Google’s detection.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.03.19.png" alt="" class="wp-image-1753" width="199" height="395" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.03.19.png 314w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.03.19-151x300.png 151w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.03.19-117x232.png 117w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.03.19-233x464.png 233w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.03.19-204x405.png 204w" sizes="auto, (max-width: 199px) 100vw, 199px" /><figcaption>Fraudulent content of the Venus malware</figcaption></figure></div>



<p>Venus is waiting for the right time to attack. The malware is able to register the time that has passed after the application has been downloaded instead of launching on the day of the download.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.07.54.png" alt="" class="wp-image-1754" width="374" height="123" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.07.54.png 933w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.07.54-300x99.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.07.54-768x254.png 768w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.07.54-703x232.png 703w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.07.54-500x165.png 500w" sizes="auto, (max-width: 374px) 100vw, 374px" /><figcaption>Sample code of the Venus malware</figcaption></figure></div>



<p>At the time of the attack, Venus interrogates a C&amp;C (Command and Control) server whose domain is: glarecube.com. The sent request is encrypted by the application as well as the response.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="599" height="593" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.08.47.png" alt="" class="wp-image-1755" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.08.47.png 599w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.08.47-300x297.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.08.47-234x232.png 234w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.08.47-469x464.png 469w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.08.47-409x405.png 409w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.08.47-80x80.png 80w" sizes="auto, (max-width: 599px) 100vw, 599px" /><figcaption>Request to the C&amp;C server</figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="510" height="725" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.09.34.png" alt="" class="wp-image-1756" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.09.34.png 510w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.09.34-211x300.png 211w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.09.34-163x232.png 163w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.09.34-326x464.png 326w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.09.34-285x405.png 285w" sizes="auto, (max-width: 510px) 100vw, 510px" /><figcaption>Response of the C&amp;C server</figcaption></figure></div>



<p>If we decrypt – which we did – the server’s response, we can see two things:&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;1) All the instructions containing URLs that redirect to premium services or websites containing ads, are all created by the fraudster</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;2) The javascript commands are what make the process fraudulent</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="543" height="580" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.10.17.png" alt="" class="wp-image-1757" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.10.17.png 543w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.10.17-281x300.png 281w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.10.17-217x232.png 217w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.10.17-434x464.png 434w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.10.17-379x405.png 379w" sizes="auto, (max-width: 543px) 100vw, 543px" /><figcaption>The decrypted response of the C&amp;C server<br><br></figcaption></figure></div>



<p>So, what happens in actual facts?&nbsp;</p>



<p>The URL is loaded into an invisible browser – or several – without the application even running. The user does not know what’s going on and is billed through its carrier afterward. Undetected, the fraudster can make its profit from advertisement clicks and premium service subscriptions.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="405" height="719" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.11.32.png" alt="" class="wp-image-1758" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.11.32.png 405w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.11.32-169x300.png 169w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.11.32-131x232.png 131w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.11.32-261x464.png 261w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.11.32-228x405.png 228w" sizes="auto, (max-width: 405px) 100vw, 405px" /></figure></div>



<p></p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.12.10.png" alt="" class="wp-image-1759" width="442" height="106" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.12.10.png 878w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.12.10-300x72.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.12.10-768x185.png 768w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.12.10-500x120.png 500w" sizes="auto, (max-width: 442px) 100vw, 442px" /></figure></div>



<p>Nothing suspicious at first sight&#8230; But the Venus malware executed two browsers!</p>



<p>Today, out of the eight uncovered Venus malware apps, only one application has been removed from the Play Store and this was done only after being downloaded more than 100,000 times. Last month, Evina also caught 304 Joker applications, some of which are still on the Play Store. All of our customers have been protected from and warned about these new trojan families and we recommend all phone owners:&nbsp;</p>



<ul class="wp-block-list"><li>To check the comments on the application page</li><li>To check the permissions (a wallpaper app doesn’t need to have phone permissions)</li><li>To avoid flashlight, scanner, wallpaper applications</li></ul>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="542" height="302" src="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.12.51.png" alt="" class="wp-image-1760" srcset="https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.12.51.png 542w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.12.51-300x167.png 300w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.12.51-416x232.png 416w, https://www.evina.com/wp-content/uploads/2020/12/Screenshot-2020-12-17-at-20.12.51-500x279.png 500w" sizes="auto, (max-width: 542px) 100vw, 542px" /><figcaption>Venus malware list &#8211; 12/09/2019</figcaption></figure></div>
<p>The post <a href="https://www.evina.com/evinas-cybersecurity-analysts-found-a-new-trojan-family-on-google-play-store/">Evina’s cybersecurity analysts found a new trojan family on Google play store.</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.evina.com/evinas-cybersecurity-analysts-found-a-new-trojan-family-on-google-play-store/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Joker malware: What you need to know</title>
		<link>https://www.evina.com/joker-malware-what-you-need-to-know/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=joker-malware-what-you-need-to-know</link>
					<comments>https://www.evina.com/joker-malware-what-you-need-to-know/#respond</comments>
		
		<dc:creator><![CDATA[Vanessa Palladino]]></dc:creator>
		<pubDate>Tue, 08 Oct 2019 07:56:00 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.evina.com/?p=2457</guid>

					<description><![CDATA[<p>Evina questioned one of our experts to share some cyber tech insights with you. Maxime INGRAO, Security Analyst tells us all about Joker, the malware everyone is talking about. </p>
<p>The post <a href="https://www.evina.com/joker-malware-what-you-need-to-know/">Joker malware: What you need to know</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong><br>What is Joker?&nbsp;</strong></p>



<p>Joker is a malware. A malicious app that makes purchases through carrier billing.</p>



<p><strong>Which apps does Joker infect ?  </strong></p>



<p>The Joker malware infects numerous malicious apps. Most of them are utility apps, image filter apps, wallpaper apps, and also anti-virus apps.</p>



<p><strong>What type of malware is Joker?</strong></p>



<p>Joker is a classic-type malware, it is executed locally after having been downloaded on the Google Play Store.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="239" src="https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-02-1-1024x239.png" alt="" class="wp-image-2465" srcset="https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-02-1-1024x239.png 1024w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-02-1-300x70.png 300w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-02-1-768x179.png 768w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-02-1-1536x358.png 1536w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-02-1-2048x478.png 2048w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-02-1-994x232.png 994w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-02-1-1989x464.png 1989w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-02-1-500x117.png 500w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-02-1-1000x233.png 1000w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-02-1-1320x308.png 1320w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>The code targeting the countries.</figcaption></figure>



<div style="height:45px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>If it is a classic malware, why is everyone speaking about it?&nbsp;</strong></p>



<p>Well, it&#8217;s a very comprehensive malware. It knows how to read and write SMS messages, and how to steal information and contact lists from users. It targets specific and numerous countries at once. The Joker malware is the perfect representation of fraud on apps.</p>



<p><strong>Were there any victims among Evina’s clients?</strong></p>



<p>No. While several anti-fraud solutions are based on a blacklist, Evina DCBprotect is different. We don’t rely on a list of malicious apps, we detect fraud types and block fraud mechanisms. In other words, we search for fraud’s DNA. Evina detected and blocked 5M+ payment attempts/transactions labeled as the Joker virus, and our clients have been informed right away.</p>



<p><strong>How is it possible to have malicious apps displayed in the Google Play Store?&nbsp;</strong></p>



<p>There are several techniques… when it comes to the Joker malware, the fraudulent code is downloaded on a server, then written after the app launches, so when Google Play receives the app and checks it, the fraudulent code doesn&#8217;t show.&nbsp;</p>



<p><strong>So, how did Evina DCBprotect detect it?&nbsp;</strong></p>



<p>The mechanism used by Joker had been identified in other malware through our mobile honeypot. Our honeypot mobile is a system that constantly installs malicious applications, decompiles and analyzes them to give us behavioral patterns to identify and block.</p>



<p><strong>What is worth knowing about this malware?&nbsp;</strong></p>



<p>First of all, the malware makes the web page invisible to the victims and clicks on the purchase button without victims being aware. In order to hide the attack, the malware modifies the x-requested-with header. Last but not least, the app grabs phone numbers and compares them to a suspect numbers database created by the fraudster to assess whether to attack. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="790" src="https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-01-1-1024x790.png" alt="" class="wp-image-2464" srcset="https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-01-1-1024x790.png 1024w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-01-1-300x231.png 300w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-01-1-768x592.png 768w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-01-1-1536x1184.png 1536w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-01-1-301x232.png 301w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-01-1-602x464.png 602w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-01-1-500x386.png 500w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-01-1-1000x771.png 1000w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-01-1-1320x1018.png 1320w, https://www.evina.com/wp-content/uploads/2021/02/Code-Pic-Issue-1-01-1.png 1892w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>The case part checking to avoid execution on specific numbers<em>.</em><br></figcaption></figure>



<div style="height:45px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>A final word?</strong></p>



<p>Joker is the buzz of the moment, but there have been and there still are a lot more harmful and sophisticated malware targeting carrier billing. We are experts in carrier billing and 100% anti-fraud focused. In the last 24 hours, we&#8217;ve protected our clients from 91 358 fraudulent transactions.</p>



<p><strong>Who is Maxime INGRAO?</strong></p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.evina.com/wp-content/uploads/2021/02/INGRAO-Maxime-768x1024.jpg" alt="" class="wp-image-2460" width="299" height="398" srcset="https://www.evina.com/wp-content/uploads/2021/02/INGRAO-Maxime-768x1024.jpg 768w, https://www.evina.com/wp-content/uploads/2021/02/INGRAO-Maxime-225x300.jpg 225w, https://www.evina.com/wp-content/uploads/2021/02/INGRAO-Maxime-1152x1536.jpg 1152w, https://www.evina.com/wp-content/uploads/2021/02/INGRAO-Maxime-174x232.jpg 174w, https://www.evina.com/wp-content/uploads/2021/02/INGRAO-Maxime-348x464.jpg 348w, https://www.evina.com/wp-content/uploads/2021/02/INGRAO-Maxime-304x405.jpg 304w, https://www.evina.com/wp-content/uploads/2021/02/INGRAO-Maxime-608x810.jpg 608w, https://www.evina.com/wp-content/uploads/2021/02/INGRAO-Maxime-1320x1760.jpg 1320w, https://www.evina.com/wp-content/uploads/2021/02/INGRAO-Maxime.jpg 1536w" sizes="auto, (max-width: 299px) 100vw, 299px" /><figcaption>Maxime INGRAO, Security Analyst</figcaption></figure>



<div style="height:45px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Security Analyst at Evina, Maxime leads the malware research, reverse engineering and security web conception. Passionate of hacking, Maxime decided from a young age to focus on cybersecurity. As a teenager, he created a community website gathering 1500+ members around cybersecurity. He started his professional path in web development before fully working in cybersecurity.</p>
<p>The post <a href="https://www.evina.com/joker-malware-what-you-need-to-know/">Joker malware: What you need to know</a> appeared first on <a href="https://www.evina.com">Evina</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.evina.com/joker-malware-what-you-need-to-know/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
